nothing ventured, nothing gained [cybersecurity]

2
For Good Measure 86 COPUBLISHED BY THE IEEE COMPUTER AND RELIABILITY SOCIETIES 1540-7993/10/$26.00 © 2010 IEEE MARCH/APRIL 2010 Nothing Ventured, Nothing Gained It is not because things are difficult that we dare not venture. It is because we dare not venture that they are difficult. —Seneca, ca. 50 A.D. which is to say the conservative, which is to say the rational—mind seeks approximations that are, at least, correct in their azimuth if not tuned to six-digit precision. To point the finger at ourselves, our 0wned Price and Security Pressure Indices ( 0PI and SPI) are trend statistics that are as good as our raw material (and honesty) can make them, but which you should read for no more than their direc- tion and relative change in velocity, month over month. Nevertheless, we will (happily) sell you index fu- tures should your appetite for risk be unrequited. In the meantime, let us assume that cybersec needs innovation and that innovation needs investment. Let us further assume that inno- vators and investors are different entities who both ignore Buck- minster Fuller (“Making money and making sense are mutually ex- clusive”). What do the numbers— that is to say, the trends—tell us? (Note that all sparklines in the fol- lowing text have a vertical axis at zero, that is, no tricky truncation of vertical scale for newsworthy ef- fect. Likewise, all horizontal axes run from 2002–2009.) Using 2002–2009, the numbers tell us that managers of university endowments, pension funds, and other institutional investors are bailing out of venture pools, and, consequently, the average venture fund is quickly getting smaller , a trend even more dra- matic when we confine our view to just the size of new funds raised: This is important; companies that began with venture money today account for 21% of the US GDP and 11% of all domestic jobs. This institutional pullback is clearly an overreaction—world GDP growth ratifies no such dash for the exits. Closer to home, the need for investment in security innovation remains clear; the curve of newly discovered vulns con- tinues to bend upward, as does our SPI (see the table). Never- theless, although venture firms continue to devote a fairly steady (~20%) share of their current deal pool to “Internet” companies, venture investment in security firms has fallen by 90% in just five years. For security innovators making C ybersecurity seems always to be just minutes away from some really smart security metri- cian elegantly capturing a unified field theory for valuing security, thus ushering in the gilded age of rational cybersec. In the meantime, the pessimistic— DANIEL E. GEER JR. In-Q-Tel DANIEL G. CONWAY Augustana College a go of being entrepreneurs, the time from inception to IPO has risen from 4.9 years in 2000 to 8.4 years today, while the odds against an IPO have become all but astro- nomical (that’s 83-to-1 for 2008, which only improved in 2009 because the number of ac- quisition deals also fell off a cliff). For those lucky enough to exit by acquisition, the return from a suc- cessful acquisition has begun to fall. Now, you might say that the more than 700 cybersecurity firms already present in the market are simply too many, so why start oth- ers? Fair question. But if we look at the publicly traded security firms and pool their R&D bud- gets, that curve is slowly declining , so the majors are not making up for entrepreneurs’ loss of opportunity, nor are the majors keeping up with either the rise in vulnerabilities nor our two indi- ces—and we claim that our indices reflect nothing so much as the in- vestments being made by our op- ponents. (We do hope that it is our opponent’s version of investment rather than our own fumbling that is driving all three.) However, as Albert Einstein fa- mously said, it’s insane to keep do- ing the same thing in the hope of different results. Maybe investment in cybersecurity, whether tracked by the nourishment of entrepre- neurial innovators or by industrial research budgets, is the thing we keep doing in the vain hope of get- ting different results—you know, cybersecurity will come home if

Upload: dg

Post on 22-Sep-2016

222 views

Category:

Documents


0 download

TRANSCRIPT

For Good Measure

86 COPUBLISHEDBYTHEIEEECOMPUTERANDRELIABILITYSOCIETIES■1540-7993/10/$26.00©2010IEEE■MARCH/APRIL2010

NothingVentured,NothingGainedIt is not because things are difficult that we dare not venture. It is because we dare not venture that they are difficult. —Seneca, ca. 50 A.D.

which is to say the conservative, which is to say the rational—mind seeks approximations that are, at least, correct in their azimuth if not tuned to six-digit precision.

To point the finger at ourselves, our 0wned Price and Security Pressure Indices (0PI and SPI) are trend statistics that are as good as our raw material (and honesty) can make them, but which you should read for no more than their direc-tion and relative change in velocity, month over month. Nevertheless, we will (happily) sell you index fu-tures should your appetite for risk be unrequited.

In the meantime, let us assume that cybersec needs innovation and that innovation needs investment. Let us further assume that inno-vators and investors are different entities who both ignore Buck-minster Fuller (“Making money and making sense are mutually ex-clusive”). What do the numbers—that is to say, the trends—tell us? (Note that all sparklines in the fol-lowing text have a vertical axis at zero, that is, no tricky truncation of vertical scale for newsworthy ef-fect. Likewise, all horizontal axes run from 2002–2009.)

Using 2002–2009, the numbers tell us that managers of university endowments, pension funds, and other institutional investors are bailing out of venture pools, and, consequently, the average venture fund is quickly getting smaller

, a trend even more dra-matic when we confine our view to just the size of new funds raised:

This is important; companies that began with venture money today account for 21% of the US GDP and 11% of all domestic jobs. This institutional pullback is clearly an overreaction—world GDP growth ratifies no such dash for the exits.

Closer to home, the need for investment in security innovation remains clear; the curve of newly discovered vulns con-tinues to bend upward, as does our SPI (see the table). Never-theless, although venture firms continue to devote a fairly steady (~20%) share of their current deal pool to “Internet” companies, venture investment in security firms has fallen by 90%

in just five years.For security innovators making

Cybersecurity seems always to be just minutes

away from some really smart security metri-

cian elegantly capturing a unified field theory

for valuing security, thus ushering in the gilded

age of rational cybersec. In the meantime, the pessimistic—

Daniel e. Geer Jr.In-Q-Tel

Daniel G. Conway

Augustana College

a go of being entrepreneurs, the time from inception to IPO has risen from 4.9 years in 2000 to 8.4 years today, while the odds against an IPO have become all but astro-nomical (that’s 83-to-1 for 2008, which only improved in 2009 because the number of ac-quisition deals also fell off a cliff ). For those lucky enough to exit by acquisition, the return from a suc-cessful acquisition has begun to fall.

Now, you might say that the more than 700 cybersecurity firms already present in the market are simply too many, so why start oth-ers? Fair question. But if we look at the publicly traded security firms and pool their R&D bud-gets, that curve is slowly declining

, so the majors are not making up for entrepreneurs’ loss of opportunity, nor are the majors keeping up with either the rise in vulnerabilities nor our two indi-ces—and we claim that our indices reflect nothing so much as the in-vestments being made by our op-ponents. (We do hope that it is our opponent’s version of investment rather than our own fumbling that is driving all three.)

However, as Albert Einstein fa-mously said, it’s insane to keep do-ing the same thing in the hope of different results. Maybe investment in cybersecurity, whether tracked by the nourishment of entrepre-neurial innovators or by industrial research budgets, is the thing we keep doing in the vain hope of get-ting different results—you know, cybersecurity will come home if

For Good Measure

www.computer.org/security 87

only we wish hard enough. Maybe the way forward is not just an arms race by metaphor but more like the real thing. If it were the real thing, then history shows that two paths and only two paths lead to victory:

• fi ght proxy wars instead of exchanging nuclear bombs, and

• force the opposition to bankrupt itself as a matter of honor.

By the fi rst, we mean identifying, as best we can, the apparent sources of attacks, rank-ordering the result-ing list, and derouting the worst netblocks. By the sec-ond, we mean accepting that exploitable vulnerabilities are found by professionals and have economic value, so our side simply outbids all conceivable competitors; as a starting point, we would open the bidding at 10¢ per vulnerable platform for a 0-day remote—that is, US$65 million for a remote in Internet Explorer. As with banking insurance, where a risk-adjusted fee on each bank’s fi nancial footprint funds depositor’s insur-ance against any bank’s stupidity, a risk-adjusted fee on each vendor’s platform footprint would fund the pool for cornering the market in vulnerabilities.

A s for our regular indices, the 0PI continues to drop, with the current level now $59,360.20.

The index drop results from the decrease in the prices of distributed denial of service (DDoS), stolen bank account information, and passports, which more than off set increases in verifi ed Paypal accounts and email lists. Identities, credit cards, FTP hacks, and RDPs remained basically unchanged. The decrease in pass-port prices is actually a refl ection in success for the good guys, as new technologies have damaged this underground market, and the product’s perceived val-ue has been lowered. As a result, older passports are priced higher than newer passports. On the troubling side, bank account login information has dropped as low as 2% of the balance. The drop in DDoS pric-

es has been widely presented as an oversupply issue. Other interesting prices not captured in the index include Facebook accounts ($8/thousand friends), ID lookup software as a service (SaaS; $6/lookup), and UPS accounts ($15).

At the same time, our SPI continues to ramp up-ward (bad), and now stands at 386:

Index Previous Current Trend

Phishing 834 917

Spam 281 314

Workfactor 91 77

Dataloss 138 236

Composite SPI 336 386

AcknowledgmentsAs ever, thanks to the Anti-Phishing Working Group, Commtouch, the US National Institute of Standards and Technology, and the Open Security Foundation for their thankless collection of data. Thanks to Peter Kuper for the venture numbers unique to this issue.

Daniel E. Geer Jr. is the chief information security of� cer for

In-Q-Tel. He was formerly vice president and chief scientist at

Verdasys, and is a past president of the Usenix Association.

Contact him at [email protected].

Daniel G. Conway is an associate professor of business ad-

ministration at Augustana College. He previously served on

the faculty at Indiana University and the University of Notre

Dame. Contact him at [email protected].

Selected CS articles and columns are also available for free at http://ComputingNow.computer.org.

Silver Bullet Security PodcastIn-depth inter v iews w i th secur i t y gurus . Hos ted by Gar y McGraw.

w w w.computer.org /secur i t y /podcastsSponsored by